Skip to content

Question - how to handle inactive managed identities deployed by ALZ-Bicep #899

@MarcoJanse

Description

@MarcoJanse

Let us know the feedback or general question

I am looking for some guidance in the documentation to handle inactive identities created by ALZ-Bicep for remediating policies as they pop up in the Defender for Cloud recommendations as inactive identities.

When I deploy all the custom policy assignments from ALZ-Bicep, a lot of system managed identities are created to remediate these policies. However, Defender for Cloud reports a lot of these identities as medium severity: Permissions of inactive identities in your Azure subscription should be revoked.
Some are even marked as critical, due to it's assigned permissions.
This alert gets triggered according to this description in Defender for Cloud:

Microsoft Defender for Cloud discovered an identity that has not performed any action on any resource within your Azure subscription in the past 45 days. It is recommended to revoke permissions of inactive identities, in order to reduce the attack surface of your cloud environment.

Some of these identities are not used at the moment, as I don't have these type of resources deployed in my Landing Zone, but this could always change in the future.
Others I haven't needed to remediate anything the past 45 days, but might be needed again in the future.

For example: the system managed identity Deploy-VMSS-Monitoring is deployed by a policy definition and creates a system managed identity, but is never used.

I suppose removing these permissions would remediate the issue or I could make exemptions for all these identities, but I'm looking for some best practice guidance on this matter.

Code of Conduct

  • I agree to follow this project's Code of Conduct

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

Status

Backlog

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions